CPE Credit Hours: 12
- Free, one-year TCEA membership for each participant ($49 value)
- TCEA digital badge
- TCEA certificate sent via email upon course completion
Why Learn with TCEA?
- Our courses are streamlined for efficient and lasting learning.
- We include training simulations that replicate the scenarios you will experience on the exam and present detailed information about what you will need to prepare for your GCT application.
- We also offer ideas and techniques based on years of experience in professional development, integrating educator feedback to always meet the needs of course participants.
Self-Paced Online Course
Data Guardian is a self-paced, online program. Participants can begin anytime and go at their own speed throughout the program.
Upon enrollment, you will receive a program invitation email from TCEA’s learning management system (Instructure’s Canvas) that will give you access to the self-paced course. Within the course, you will find modules that must be moved through in sequential order. The modules can be found below.
|Module 1||Safeguard Your Data||In this module, you will learn important vocabulary and be able to explain how and why data breaches occur. What’s more, you will see examples of policies and procedures for safeguarding sensitive data and explore how others handle personally identifiable information (PII) and HIPPA data. You will learn about Texas's version of Safe Harbor, NIST and MITRE frameworks, and how encrypting data is a big first step in protecting yourself and your organization.|
|Module 2||Encrypt Your Data||In this module, you will explore when you should encrypt your data and free and open source encryption (e.g. AES-256) tools. You will also learn how to encrypt and decrypt text, files, and folders. And finally, you will discover how to create encrypted data containers to house sensitive data, no matter where you might back up your data.|
|Module 3||Protect Your Data||In this module, you will learn how to create and store a secure password, as well as protect your device against malware. Discover more about firewalls for Windows and Macintosh devices and the value of multi-factor authentication. Maintaining the integrity of your data through storage defragmentation and registry maintenance is also presented.|
|Module 4||Secure the Cloud||In this module, you will learn about cloud-based storage scanning solutions. These solutions, which some districts employ, scour cloud storage areas (e.g. Google Workspace and MS 365 OneDrive) to find leaked confidential information. This module also introduces you to fake phishing attacks and cloud encryption tools (free and for pay) to safeguard your content. You will also learn how to create encrypted conduits that protect you when you are mobile at the coffee shop or in a packet-sniffing friendly environment.|
|Module 5||Know Your Tools||In this module, explore how you can use built-in encryption protocols and tools to safeguard data even when you have no other resources available. You will also learn some additional ways to secure your device with full disk encryption, as well as recover your password on Windows and Mac computers.|